Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3289: Path Traversal in Sanluan PublicCMS

0
Medium
VulnerabilityCVE-2026-3289cvecve-2026-3289
Published: Fri Feb 27 2026 (02/27/2026, 04:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Sanluan
Product: PublicCMS

Description

CVE-2026-3289 is a medium severity path traversal vulnerability affecting Sanluan PublicCMS version 6. 202506. d. The flaw exists in the saveMetadata function within TemplateCacheComponent. java, allowing remote attackers to manipulate file paths. Exploitation does not require user interaction but does require low-level privileges. The vulnerability could enable attackers to access or overwrite arbitrary files on the server, potentially leading to information disclosure or integrity compromise. Although the vendor was notified, no patch or response has been issued, and a public exploit is available. No known active exploitation in the wild has been reported yet. Organizations using this specific CMS version should prioritize mitigation to prevent potential attacks.

AI-Powered Analysis

AILast updated: 02/27/2026, 19:27:22 UTC

Technical Analysis

CVE-2026-3289 identifies a path traversal vulnerability in Sanluan PublicCMS version 6.202506.d, specifically within the saveMetadata function of the TemplateCacheComponent.java file, which is part of the Template Cache Generation component. Path traversal vulnerabilities allow attackers to manipulate file paths to access files and directories outside the intended scope, potentially leading to unauthorized file read or write operations. This vulnerability can be exploited remotely without user interaction, but it requires low privileges on the system (PR:L). The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based (AV:N), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (AT:N) but low privileges needed (PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited degree (VC:L, VI:L, VA:L). The vendor was contacted early but did not respond or provide a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to read or write arbitrary files on the server hosting PublicCMS, potentially exposing sensitive data or enabling further compromise. No known active exploitation in the wild has been reported to date. The lack of vendor response and public exploit availability necessitates immediate attention from organizations using this CMS version. The affected component, Template Cache Generation, is critical for CMS operation, making exploitation impactful on web content integrity and availability.

Potential Impact

The potential impact of CVE-2026-3289 includes unauthorized access to sensitive files and data leakage, which compromises confidentiality. Attackers could also modify or overwrite files, affecting the integrity of the CMS and potentially leading to website defacement or injection of malicious code. Availability could be impacted if critical files are deleted or corrupted, disrupting web services. Since exploitation requires only low privileges and no user interaction, attackers with limited access could escalate their control or pivot to other systems. Organizations relying on Sanluan PublicCMS 6.202506.d for web content management are at risk of data breaches, reputational damage, and operational disruption. The absence of a vendor patch and the presence of a public exploit increase the likelihood of exploitation attempts, especially by opportunistic attackers. This vulnerability could be leveraged as an initial foothold in targeted attacks or as part of broader campaigns against web infrastructure.

Mitigation Recommendations

Organizations should immediately audit their use of Sanluan PublicCMS to identify installations running version 6.202506.d. Until a vendor patch is available, implement strict access controls to limit who can interact with the CMS, especially restricting low-privilege accounts from accessing the Template Cache Generation functionality. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the saveMetadata function. Monitor logs for unusual file access patterns or attempts to manipulate file paths. Consider isolating the CMS environment to minimize lateral movement if compromised. Regularly back up CMS data and configuration files to enable recovery from potential file corruption or deletion. Engage with the vendor or community for updates or unofficial patches. If feasible, upgrade to a later, unaffected version once available. Conduct penetration testing focused on path traversal vulnerabilities to identify other potential weaknesses. Educate administrators about the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T16:56:55.155Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1ec5132ffcdb8a267e1f3

Added to database: 2/27/2026, 7:11:13 PM

Last enriched: 2/27/2026, 7:27:22 PM

Last updated: 2/27/2026, 8:25:41 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses